-
It hunts down the fastest DNS servers available for your computer to use. namebench runs a fair and thorough benchmark using your web browser history, tcpdump output, or standardized datasets in order to provide an individualized recommendation. namebench is completely free and does not modify your system in any way. This project began as a 20% project at Google.
namebench runs on Mac OS X, Windows, and UNIX, and is available with a graphical user interface as well as a command-line interface.
-
Crypto javascripts AES, SHA etc
-
ES is a ‘symmetric block cipher’ for encrypting texts which can be decrypted with the original encryption key.
For many purposes, a simpler encryption algorithm such as TEA is perfectly adequate – but if you suspect the world’s best cryptographic minds, and a few million dollars of computing resource, might be attempting to crack your security, then AES, based on the Rijndael algorithm, is the tightest security currently available (approved by the US government for classified information up to ‘Secret’ – and in in 192 or 256 key lengths, up to ‘Top Secret’). AES was adopted by NIST in 2001 as FIPS-197, and is the replacement for DES which was withdrawn in 2005.
-
JavaScrypt's encryption facilities use the Advanced Encryption Standard (AES) adopted by the United States as Federal Information Processing Standard 197. AES supports key lengths of 128, 192, and 256 bits; JavaScrypt uses 256 bit keys exclusively.
-
he JavaScript Crypto Library provides web developers with an extensive and efficient set of cryptographic functions. The library aims to obtain maximum execution speed while preserving modularity and reusability. The library is released as open source under an AGPL license. If you are a web developer and into Javascript check it out!
# the fastest AES-256;
# the only available Javascript implementation of:* Fortuna, a strong pseudo-random number generator;
* SRP, the verifier-based authentication protocol;# a robust and efficient SHA-2 hash function
-
The Rijndael algorithm was announced as the winner of the Advanced Encryption Standard (AES) in 2001. This algorithm is intended to replace the DES algorithm. AES was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits. AES is defined in Fips 197. Click here for a description of how AES works.
-
hy use cryptography in Javascript? One major reason is the need to encrypt data before uploading it to a server; this is useful where the server needs to store data but doesn't wish to see it in the clear. It can also be used in desktop applications written in Javascript – for example, Firefox extensions.
We offer a fast, small symmetric encryption library written in Javascript. Though several such libraries exist, jsCrypto offers several advantages.
* A clean, simple interface to basic AES encryption/decryption, as well as OCB and CCM modes for authenticated encryption
* A cryptographic random number generator that collects randomness from user mouse movements, among other sources
* jsCrypto is at least four times faster in all browsers and about 12% smaller than the best previously existing implementation
* In Internet Explorer, jsCrypto is 11 times faster than the fastest previous existing implementation
Category: bits
links for 2009-12-17
-
SkyGrabber is offline satellite internet downloader. It intercepts satellite data( movie, music, pictures ) that downloadind by other users and saves information in your hard disk. So, you'll get new movie, best music and funny pictures for free.
links for 2009-12-16
-
Zabaan offers a four-week Urdu Script course for FREE Sunday and Wednesday evenings. We realize that there are a lot of people who know Hindi and Urdu but do not know how to read and write Urdu, and so, we would like to teach this easy-to-learn script for FREE.
-
DECAF is a counter intelligence tool specifically created around the obstruction of the well known Microsoft product COFEE used by law enforcement around the world.
DECAF provides real-time monitoring for COFEE signatures on USB devices and running applications. Upon finding the presence of COFEE, DECAF performs numerous user-defined processes; including COFEE log clearing, ejecting USB devices, drive-by dropper, and an extensive list of Lockdown Mode settings. The Lockdown mode gives the user an automated approach to locking down the machine at the first sign of unusual law enforcement activity.
links for 2009-12-15
-
SymmetricDS is web-enabled, database independent, data synchronization/replication software. It uses web and database technologies to replicate tables between relational databases in near real time. The software was designed to scale for a large number of databases, work across low-bandwidth connections, and withstand periods of network outage.
By using database triggers, SymmetricDS guarantees that data changes are captured and atomicity is preserved. Support for database vendors is provided through a Database Dialect layer, with implementations for MySQL, Oracle, SQL Server, PostgreSQL, DB2, Firebird, HSQLDB, H2, and Apache Derby included.
-
Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitions. It is useful for both digital forensics investigation and file recovery. Scalpel resulted from a complete rewrite of foremost 0.69, a popular open source file carver, to enhance performance and decrease memory usage.
-
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery.
-
JMagick is a thin JNI layer above the ImageMagick C-API. im4java in contrast just generates the commandline for the ImageMagick commands and passes the generated line to the selected IM-command (using the java.lang.ProcessBuilder.start()-method).
Disadvantages of the approach: your are limited to the capabilities of the IM commands. With JMagick, you have access to the low-level interface of IM and therefore you have a very detailed control of the processing of images. And you have better performance.
-
JMagick is an open source Java interface of ImageMagick. It is implemented in the form of Java Native Interface (JNI) into the ImageMagick API.
JMagick does not attempt to make the ImageMagick API object-oriented. It is merely a thin interface layer into the ImageMagick API.
links for 2009-12-14
-
I, Michael "Monty" Widenius, the creator of MySQL, is asking you urgently to help save MySQL from Oracle's clutches. Without your immediate help Oracle might get to own MySQL any day now. By writing to the European Commission (EC) you can support this cause and help secure the future development of the product MySQL as an Open Source project.
links for 2009-12-13
links for 2009-12-11
links for 2009-12-10
-
FranchiseExpo.in is the premier directory for the best franchises and franchise business opportunities available in India and the entire Indian Subcontinent. Franchisee and Business Opportunity Options are available for Bangladesh, Bhutan, Burma, Nepal, Pakistan and Sri Lanka. When you own a franchise business, you’re in business for yourself, but not by yourself.
links for 2009-12-09
-
This tutorial shows you how to write contract-first Web services, that is, developing web services that start with the XML Schema/WSDL contract first followed by the Java code second. Spring-WS focuses on this development style, and this tutorial will help you get started. Note that the first part of this tutorial contains almost no Spring-WS specific information: it is mostly about XML, XSD, and WSDL. The second part focusses on implementing this contract using Spring-WS .
-
ROS is an open-source, meta-operating system for your robot. It provides the services you would expect from an operating system, including hardware abstraction, low-level device control, implementation of commonly-used functionality, message-passing between processes, and package management.
-
Backing up data regularly should be one of the most important tasks of every computer user; Yet only a minority is doing it thoroughly and regularly. The rest is flirting with disaster as there are numerous incidents that can delete data on computer systems. The most common ones are hardware failures, which can mean damaged hard drives but also (partially) unreadable CDs or DVDs, computer virus attacks but also human error. If you have ever met someone who partitioned the wrong hard drive you know that the latter can be cause for great frustration.
-
Personal-Backup is a program to save personal data to any destination folder. This folder may be located on a local fixed or removable drive, on a windows network server or on a FTP server. It runs under Windows 98SE/ME, Windows NT4/2000/XP, Windows Vista, Windows Server 2003/2008 and Windows 7. The program configuration is stored for each user individually.
-
Eucalyptus – Elastic Utility Computing Architecture Linking Your Programs To Useful Systems – is an open-source software infrastructure for implementing "cloud computing" on clusters. The current interface to Eucalyptus is compatible with Amazon's EC2, S3, and EBS interfaces, but the infrastructure is designed to support multiple client-side interfaces. Eucalyptus is implemented using commonly available Linux tools and basic Web-service technologies making it easy to install and maintain.
-
AppScale is a platform that allows users to deploy and host their own Google App Engine applications. It executes automatically over Amazon EC2 and Eucalyptus as well as Xen and KVM. It has been developed and is maintained by the RACELab at UC Santa Barbara.
links for 2009-11-02
-
Neo4j is a graph database. It is an embedded, disk-based, fully transactional Java persistence engine that stores data structured in graphs rather than in tables. A graph (mathematical lingo for a network) is a flexible data structure that allows a more agile and rapid style of development.